Researchers Discover 29 Types of USB Attacks To Demonstrate Smartphone Vulnerabilities - hodgesdarm1977
Plugging an unknown USB drive into your system could have disastrous consequences, that's a well celebrated fact. While USB drives are quite handy when you can to quickly transfer files between systems or keep important files with you on the go, they're known to haven malware which could compromise the security of your devices. USB drives can be loaded with anything from Trojans to ransomware which could wreak havoc unless you have an updated anti-virus.
Nevertheless, new types of malware keep pop up ever so often and eve the superfine anti-virus software sometimes have got a tall clip sleuthing them. Now, researchers from Ben-Gurion University in Israel make discovered 29 types of USB attacks that flush have the potency to via media your smartphone. Ran Yahalom, matchless of the researchers on the project, told TechRepublic:
"There are many non-trivial USB-based attacks. Approximately are carried out by the host, the computer connecting the USB peripheral. The most common ones are infected, operating theater malicious. Erstwhile connected, they have access and take control of your information processing system.
Microcontrollers are another attack family. Microcontrollers bum impersonate a USB off-base. For example, you can program a TNC microcontroller or an Adreno to behave like a keyboard or a mouse. Erstwhile you program a keyboard and connect, it actually starts injecting key presses. Information technology's actually equal having someone working on your electronic computer."
Yahalom goes happening to explain a number of other different types of USB-based attacks. For example, he talks about an attack which makes use of an hit-the-shelf USB drive with reprogrammed firmware that can personify remotely obsessed. Other types of attacks let in electrical attacks, which make use of electrical components disguised every bit a USB drive which own the capability of pushing a power surge through and through the system and frying the computer.
It's not just computers that are vulnerable to such USB attacks. As Yahalom explains, even smartphones are susceptible to microcontrollers disguised as chargers which can follow used to lock the device unless a ransom is reply-paid. As a proof of construct, Yahalom developed a microcontroller which looked like a normal mobile charger and used it to with success lock a device.
To prevent so much devices from affecting your computer or smartphone, Yahalom suggests:
"Treat applied science as something you don't naturally trust. As users, we ahave a tendency to trust technology, to trust peripherals, i.e., you confidence your flash drive, you trustingness your keyboard, but you trust it because you're not aware. Treat it as a syringe: You wouldn't regain a syringe in the parking, pick it heavenward, and interject IT to yourself. Because you're conscious you could be infected. You have No knowledge of what could happen, simply are afraid because it could be dangerous. This is on the button the same thing."
Source: https://beebom.com/beware-29-types-usb-attacks/
Posted by: hodgesdarm1977.blogspot.com
0 Response to "Researchers Discover 29 Types of USB Attacks To Demonstrate Smartphone Vulnerabilities - hodgesdarm1977"
Post a Comment